Skip to content

Conversation

@brada4
Copy link

@brada4 brada4 commented Feb 1, 2025

Drop ICMPv6 packets that are not explicitly allowed, like falling outside conntrack due to missing embedded state header like in referenced issue

Add older patch and omit singular echo reply as it is traditionally seen only in conntrack state only initiated by echo request.

implement rfc6092 REC-10

Fixes: openwrt/openwrt#17800
Supersedes: openwrt/openwrt#17805
Supersedes: #38
Signed-off-by: Andris PE neandris@gmail.com
Fixes: openwrt/openwrt#21549

Drop ICMPv6 packets that are not explicitly allowed, like falling
outside conntrack due to missing embedded state header like in
referenced issue

Add older patch and omit singular echo reply as it is traditionally seen only in
conntrack state only initiated by echo request

Fixes: openwrt/openwrt#17800
Supersedes: openwrt/openwrt#17805
Supersedes: openwrt#38
Signed-off-by:
@brada4
Copy link
Author

brada4 commented Feb 1, 2025

Tested on both fw3 and fw4. Test machine with lan mtu 64 to chop icmp embedded extra header
@hauke @jow- this has to be pushed to fw3 and picked to both stable branches. Thank you in advance.

@f00b4r0
Copy link

f00b4r0 commented Feb 16, 2025

I'd suggest closing #38 if it's not longer relevant: there were no 3rd-party comments there and this will ease maintainer's workload.

@brada4
Copy link
Author

brada4 commented Feb 16, 2025

Kind of does not change much... I linked it to shoot all at once.

@jow-
Copy link
Contributor

jow- commented Mar 17, 2025

Please remove the commented out lines and prefix the commit subject with config:

@brada4 brada4 changed the title [uci config] Drop unaccounted icmp6 packets config: Drop unaccounted icmp6 packets Mar 24, 2025
@brada4
Copy link
Author

brada4 commented Mar 24, 2025

@jow- @dave14305 hope all issues fixed?

brada4 added a commit to brada4/openwrt that referenced this pull request Dec 11, 2025
Do not accept unsolicited ICMP echo reply. It is implied by conntrack
state from request already. cf openwrt/firewall4#44
Also exemplified by ipv4 ping rule

Limit peer-to-peer ipsec to ipv6 only as stated in original "ipv6 cpe
requirements" cf openwrt/firewall4#65

Signed-off-by:
brada4 added a commit to brada4/openwrt that referenced this pull request Dec 11, 2025
Do not accept unsolicited ICMP echo reply. It is implied by conntrack
state from request already. cf openwrt/firewall4#44
Also exemplified by ipv4 ping rule

Limit peer-to-peer ipsec to ipv6 only as stated in original "ipv6 cpe
requirements" cf openwrt/firewall4#65

Signed-off-by: Andris PE <neandris@gmail.com>
brada4 added a commit to brada4/openwrt that referenced this pull request Dec 11, 2025
Do not accept unsolicited ICMP echo reply. It is implied by conntrack
state from request already. cf openwrt/firewall4#44
Also exemplified by ipv4 ping rule

Limit peer-to-peer ipsec to ipv6 only as stated in original "ipv6 cpe
requirements" cf openwrt/firewall4#65

Signed-off-by: Andris PE <neandris@gmail.com>
@brada4 brada4 marked this pull request as draft January 16, 2026 11:29
drop comment

fix typo

implement rfc6092 REC-10

Fixes: openwrt/openwrt#21549
Signed-off-by: Andris PE <neandris@gmail.com>

Signed-off-by: Andris PE <neandris@gmail.com>
@brada4 brada4 marked this pull request as ready for review January 18, 2026 21:59
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

Reinterpretation of RFC4890 for default firewall rules ssh stuck at expecting SSH2_MSG_KEX_ECDH_REPLY

4 participants